Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    15/01/2024, 03:34

General

  • Target

    5c07b160cfd239fce80b483c5f9aa787.exe

  • Size

    77KB

  • MD5

    5c07b160cfd239fce80b483c5f9aa787

  • SHA1

    7902ebf2588d014d2c448351c090244a135b9407

  • SHA256

    c8b2ce588f1708d8561f2e0e266ca09608d4bdd57500d87960ee4af2bae93717

  • SHA512

    1251b53e5bab1cc31c39dd6866d67d088aee21a06acdcbae18ea9bda653d8327679cec47cb01539741683b5f309c1932df499fa29a0a60d6aa8e3d5b06a1a826

  • SSDEEP

    1536:sNMUtKwEMtLqWHrVGxmx7sQ9PCdd6BVF9BI3iWhd9QrOa5OXi+c:J9MsWHZGxm/9PCz6BTXbg+1

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c07b160cfd239fce80b483c5f9aa787.exe
    "C:\Users\Admin\AppData\Local\Temp\5c07b160cfd239fce80b483c5f9aa787.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Windows\SysWOW64\hinvserv.exe
      C:\Users\Admin\AppData\Local\Temp\5c07b160cfd239fce80b483c5f9aa787.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Windows\SysWOW64\bcdlmem.exe
        C:\Windows\system32\bcdlmem.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:2636
        • C:\Windows\SysWOW64\hinvserv.exe
          C:\Windows\SysWOW64\bcdlmem.exe
          4⤵
          • Deletes itself
          • Executes dropped EXE
          • Drops file in System32 directory
          PID:2676

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\bcdlmem.exe

          Filesize

          77KB

          MD5

          5c07b160cfd239fce80b483c5f9aa787

          SHA1

          7902ebf2588d014d2c448351c090244a135b9407

          SHA256

          c8b2ce588f1708d8561f2e0e266ca09608d4bdd57500d87960ee4af2bae93717

          SHA512

          1251b53e5bab1cc31c39dd6866d67d088aee21a06acdcbae18ea9bda653d8327679cec47cb01539741683b5f309c1932df499fa29a0a60d6aa8e3d5b06a1a826

        • C:\Windows\SysWOW64\hinvserv.exe

          Filesize

          2KB

          MD5

          a1ed06964c3063a4f92cd97a4adbd040

          SHA1

          02adb961b0ed39312ad84481e1c781ca0d731ef0

          SHA256

          bc574c38e63b4b82a444ff7184b6cf6a5a9b635b484784436d42dba5a7cea19d

          SHA512

          a1ea06d08d3dc6afc3056c8174bf8204c7f71135a6b8c3ac55ceef7348ab3886e16c6955ce569d12145ad9632274e8198252b6fc0509952c6c2d43086fc33fef

        • memory/1472-1-0x00000000002A0000-0x00000000002A4000-memory.dmp

          Filesize

          16KB

        • memory/1472-0-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB

        • memory/1472-11-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB

        • memory/2636-23-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB

        • memory/2636-13-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB